YoVDO

MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Software Development Courses Cybersecurity Courses Code Coverage Courses

Course Description

Overview

Explore an innovative approach to optimizing OS fuzzer seed selection through trace distillation in this USENIX Security '18 conference talk. Dive into the challenges of generating effective seed system call sequences for OS fuzzing and learn how MoonShine, a novel strategy, addresses these issues. Discover how MoonShine leverages light-weight static analysis to efficiently detect dependencies across system calls, distilling millions of system calls from real-world programs into a compact, diverse set of seeds. Examine the implementation of MoonShine as an extension to Syzkaller, a state-of-the-art evolutionary fuzzer for the Linux kernel, and analyze its impressive results in improving code coverage and uncovering new vulnerabilities. Gain insights into the comparison between trace distillation and user-level seed selection, the challenges of distillation, and the techniques for tracking implicit dependencies. Evaluate the effectiveness of this approach through detailed setup and performance metrics, concluding with a discussion on the significant improvements in coverage achieved by MoonShine.

Syllabus

Intro
OS Fuzzing - Overview
Synthetic Program Generation
Trace Distillation vs. User-Level Seed Selection
Distillation Challenges
Tracking Implicit Dependencies
Implementation
Evaluation - Setup
Effectiveness of Distillation
Conclusion
Coverage Improvement


Taught by

USENIX

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera